US20080022201A1 - Personalized fine granularity access control for calendar systems - Google Patents

Personalized fine granularity access control for calendar systems Download PDF

Info

Publication number
US20080022201A1
US20080022201A1 US11/458,435 US45843506A US2008022201A1 US 20080022201 A1 US20080022201 A1 US 20080022201A1 US 45843506 A US45843506 A US 45843506A US 2008022201 A1 US2008022201 A1 US 2008022201A1
Authority
US
United States
Prior art keywords
event
field
end user
program code
calendar view
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/458,435
Inventor
Li Chen
Yongcheng Li
Lun Xiao
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/458,435 priority Critical patent/US20080022201A1/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: CHEN, LI, LI, YONGCHENG, XIAO, Lun
Publication of US20080022201A1 publication Critical patent/US20080022201A1/en
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting

Definitions

  • the present invention relates to the field of computer based calendaring and scheduling and more particularly to access control for viewing appointments in a calendaring and scheduling system.
  • Calendaring systems have formed the core component of personal information management software and firmware applications for decades. Initially, a mere calendar display, modern calendaring systems provide scheduling and alarm functions in addition to full integration with contact management, time entry, billing and project management applications.
  • the typical calendaring application minimally provides a mechanism for scheduling an event to occur on a certain date at a certain time. Generally, the event can be associated with a textual description of the event. More advanced implementations also permit the association of the scheduled event with a particular contact, a particular project, or both.
  • most calendar applications provide functionality for setting an alarm prior to the occurrence of the event, as well as archival features.
  • C&S Calendaring & Scheduling
  • Known C&S products include Lotus Notes, Microsoft Outlook, and web-based products like Yahoo! Calendar. These products allow one to manage personal events including appointments and anniversaries. C&S products also typically allow one to manage shared events, referred to generally as meetings.
  • the end user For an end user to identify free time for another user, the end user at least must be able to view the existence of all scheduled events including private events. Otherwise, a private event will masquerade as free time. Yet, the privacy of the content of a private event cannot be compromised solely to expose the event as consuming free time. Likewise, even where a user is authorized to view the events of another user, it may be the intent that only certain portions of an event are to be exposed while others are to remain private. Notwithstanding, conventional C&S systems permit the binary choice only of exposing an event in its entirety, or hiding an event in it's entirety.
  • Embodiments of the present invention address deficiencies of the art in respect to event exposure in a C&S system and provide a novel and non-obvious method, system and computer program product for personalized fine granularity access control for C&S systems.
  • a method for personalized fine granularity access control in a C&S data processing system can be provided.
  • the method can include loading an event for inclusion in a shared calendar view, determining on a field by field basis whether to include portions of the event in the shared calendar view, and rendering the calendar view.
  • the method further can include further determining whether the event has been marked private, and, if the event has been marked private, including in the shared calendar view only an indication that a private event has been scheduled without revealing content for the private event.
  • determining on a field by field basis whether to include portions of the event in the shared calendar view can include identifying an end user requesting the shared calendar view, loading a set of field level access attributes for the event, comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, and including in the calendar view only fields of the event permitted to be viewed by the identified end user.
  • determining on a field by field basis whether to include portions of the event in the shared calendar view can include suppressing an identity of a person associated with the event from display in the shared calendar view, and including in the shared calendar view a time range and type for the event.
  • determining on a field by field basis whether to include portions of the event in the shared calendar view can include suppressing a description of the event from display in the shared calendar view, and including in the shared calendar view a time range and type for the event.
  • a C&S data processing system can be provided.
  • the C&S data processing system can include C&S core logic coupled to a data store of events, a C&S user interface, and access control logic.
  • the access control logic can include program code enabled to determine whether to include portions of events in the data store of events in a shared calendar view of the C&S user interface on a field-by-field basis according to field level access attributes for the events.
  • the program code of the access control logic further can be enabled to render an indication of a private event for an unauthorized viewer of the private event in lieu of suppressing the private event in its entirety.
  • FIG. 1 is a schematic illustration of a C&S system configured for personalized fine granularity access control
  • FIG. 2 is a screen shot of an exemplary C&S system user interface configured for personalized fine granularity access control for C&S systems
  • FIG. 3 is a flow chart illustrating a process for personalized fine granularity access control.
  • Embodiments of the present invention provide a method, system and computer program product for personalized fine granularity access control.
  • access control attributes can be assigned to each field in an event. Thereafter, when sharing the event in the calendar view of different end users, the event can be rendered with some fields hidden from view according to the permissions of a viewing user, while other fields of the event can be rendered for view.
  • private events can be rendered only as a private event, while the content of the private events can remain hidden. In this way, private events cannot masquerade as free time and the privacy of selected content of a shared event can be maintained.
  • FIG. 1 is a schematic illustration of a C&S system configured for personalized fine granularity access control.
  • the C&S system can include a host computing platform 120 supporting the operation of a C&S system.
  • the host computing platform 120 can be configured for coupling over a data communications network 130 to one or more client computing devices 110 associated with corresponding end users of the C&S system.
  • client computing devices 110 associated with corresponding end users of the C&S system.
  • the different end users of the C&S system can interact with the C&S system in order to create, manage and view scheduled events for one another in a collaborative environment.
  • the C&S system can include C&S core logic 140 coupled to a data store of events 160 and a corresponding C&S user interface 200 .
  • the C&S core logic 140 can include program code enabled to provide essential calendaring functionality including the creation and management of scheduled events such as those events marked private and those events that are permitted to be viewed by other end users. Additionally, the C&S core logic 140 can be coupled to access control logic 300 for determining when to expose a view to different end users of different scheduled events in the data store of events 160 , and when to refrain from exposing a view to different end users of different scheduled events in the data store of events 160 .
  • the access control logic 300 can include program code enabled to provide personalized, fine granularity access control to the events in the data store of events 160 .
  • the program code of the access control logic 300 can be enabled to determine access for a particular end user on a field-by-field basis as specified by field level access attributes 150 for each event in the data store of events 160 . Consequently, when rendering a view of an event in the C&S user interface 200 , only those fields determined to be viewable can be rendered in the C&S user interface 200 .
  • the program code of the access control logic 300 can indicate in a view of the event in the C&S user interface 200 that a private event occurs during a specified time range without revealing the content of the private event.
  • FIG. 2 is a screen shot of an exemplary C&S system user interface configured for personalized fine granularity access control for C&S systems.
  • the user interface 200 can provide a shared calendar view for multiple different end users of the C&S system.
  • the shared calendar view can include one or more events rendered to indicate a time range of each event.
  • Each event can include multiple different event fields 210 , 220 , 230 , 240 .
  • the event fields can include a time range 210 , an event type 220 , an event person(s) or role(s) 230 and an event description 240 .
  • Other event fields can include subject, location, chairperson, and category, to name only a few.
  • each event in the shared calendar view only certain fields of each event can be rendered viewable while others can be suppressed from view.
  • private events can show as private in the shared calendar view, though the content of the private events can be suppressed from view as shown in FIG. 2 .
  • scheduled events can be shown as consuming free time to other authorized end users, yet the privacy of a private event can be maintained.
  • the existence of a scheduled event can be shown, though portions of the event can remain private to only those end users authorized to view those private portions according to the field level attributes for the private portions and the identity of the end users viewing the events.
  • the access control for viewing events in a shared calendar view can be personalized according to the identity of a viewing end user, or a role of a viewing end user.
  • each field can be assigned a field level access attribute indicating whether the field is to be viewed by an authorized user, user type or role.
  • the field will be revealed only if the identity of the end user or role of the end user matches the field level access attribute.
  • the content of a field may vary according to the identity of the viewing end user or the role of the viewing end user. For instance, whereas one end user may view a field to read “re: Secret Project”, another end user may only view a field to read “re: Project”.
  • FIG. 3 is a flow chart illustrating a process for personalized fine granularity access control.
  • a user identifier for an end user of the C&S system can be obtained as can access rights for the end user in block 310 .
  • a first event can be retrieved from the event database for rendering in the shared calendar view for the end user.
  • decision block 320 it can be determined if the event has been marked private. If so, in block 325 the event can be included in the shared calendar view for the specified time range only as a “private” event while the content of the private event can remain hidden.
  • the event is private to the end user associated with the user identifier, then the entirety of the private event can be included for view in the shared calendar view.
  • decision block 320 if the event has not been marked private, in block 330 , a first field in the event can be retrieved for processing.
  • decision block 335 if the field has field attributes permitting the rendering of the field for viewing by the end user, in block 340 the content of the field can be included in the shared calendar view.
  • decision block 345 if additional fields remain to be processed, in block 330 a next field can be retrieved and the process can repeat through decision block 335 .
  • decision block 350 it can be determined if additional events remain to be processed. If so, in block 315 a next event can be retrieved and the process can continue through decision block 320 . Otherwise, the shared calendar view can be rendered in block 355 .
  • Embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements.
  • the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, and the like.
  • the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device.
  • the medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium.
  • Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk.
  • Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
  • a data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus.
  • the memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
  • I/O devices including but not limited to keyboards, displays, pointing devices, etc.
  • Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Abstract

Embodiments of the present invention address deficiencies of the art in respect to event exposure in a C&S system and provide a method, system and computer program product for personalized fine granularity access control for C&S systems. In one embodiment, a method for personalized fine granularity access control in a C&S data processing system can be provided. The method can include loading an event for inclusion in a shared calendar view, determining on a field by field basis whether to include portions of the event in the shared calendar view, and rendering the calendar view. The method further can include further determining whether the event has been marked private, and, if the event has been marked private, including in the shared calendar view only an indication that a private event has been scheduled without revealing content for the private event.

Description

    BACKGROUND OF THE INVENTION
  • 1. Field of the Invention
  • The present invention relates to the field of computer based calendaring and scheduling and more particularly to access control for viewing appointments in a calendaring and scheduling system.
  • 2. Description of the Related Art
  • Calendaring systems have formed the core component of personal information management software and firmware applications for decades. Initially, a mere calendar display, modern calendaring systems provide scheduling and alarm functions in addition to full integration with contact management, time entry, billing and project management applications. The typical calendaring application minimally provides a mechanism for scheduling an event to occur on a certain date at a certain time. Generally, the event can be associated with a textual description of the event. More advanced implementations also permit the association of the scheduled event with a particular contact, a particular project, or both. Furthermore, most calendar applications provide functionality for setting an alarm prior to the occurrence of the event, as well as archival features.
  • Several software products include support for Calendaring & Scheduling (C&S). Known C&S products include Lotus Notes, Microsoft Outlook, and web-based products like Yahoo! Calendar. These products allow one to manage personal events including appointments and anniversaries. C&S products also typically allow one to manage shared events, referred to generally as meetings.
  • Within a C&S system, it is common to render public calendar entries such as appointments, events or meetings, viewable by other users of the C&S system. Notwithstanding, to ensure privacy, events or meetings marked private can be hidden from the view of others. Generally, users afforded access to view the calendar entries of another user can view all of the calendar entries of the other user. In this way, different users can locate “free time” for including a selection of users in a meeting. Yet, when an event or meeting has been rendered public, other users can view the entirety of the event or meeting including all event fields such as the identity of the attendants and the subject matter of the meeting.
  • For an end user to identify free time for another user, the end user at least must be able to view the existence of all scheduled events including private events. Otherwise, a private event will masquerade as free time. Yet, the privacy of the content of a private event cannot be compromised solely to expose the event as consuming free time. Likewise, even where a user is authorized to view the events of another user, it may be the intent that only certain portions of an event are to be exposed while others are to remain private. Notwithstanding, conventional C&S systems permit the binary choice only of exposing an event in its entirety, or hiding an event in it's entirety.
  • BRIEF SUMMARY OF THE INVENTION
  • Embodiments of the present invention address deficiencies of the art in respect to event exposure in a C&S system and provide a novel and non-obvious method, system and computer program product for personalized fine granularity access control for C&S systems. In one embodiment, a method for personalized fine granularity access control in a C&S data processing system can be provided. The method can include loading an event for inclusion in a shared calendar view, determining on a field by field basis whether to include portions of the event in the shared calendar view, and rendering the calendar view. The method further can include further determining whether the event has been marked private, and, if the event has been marked private, including in the shared calendar view only an indication that a private event has been scheduled without revealing content for the private event.
  • In one aspect of the embodiment, determining on a field by field basis whether to include portions of the event in the shared calendar view can include identifying an end user requesting the shared calendar view, loading a set of field level access attributes for the event, comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, and including in the calendar view only fields of the event permitted to be viewed by the identified end user.
  • In another aspect of the embodiment, determining on a field by field basis whether to include portions of the event in the shared calendar view can include suppressing an identity of a person associated with the event from display in the shared calendar view, and including in the shared calendar view a time range and type for the event. Finally, in yet another aspect of the embodiment, determining on a field by field basis whether to include portions of the event in the shared calendar view can include suppressing a description of the event from display in the shared calendar view, and including in the shared calendar view a time range and type for the event.
  • In another embodiment of the invention, a C&S data processing system can be provided. The C&S data processing system can include C&S core logic coupled to a data store of events, a C&S user interface, and access control logic. The access control logic can include program code enabled to determine whether to include portions of events in the data store of events in a shared calendar view of the C&S user interface on a field-by-field basis according to field level access attributes for the events. The program code of the access control logic further can be enabled to render an indication of a private event for an unauthorized viewer of the private event in lieu of suppressing the private event in its entirety.
  • Additional aspects of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The aspects of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the appended claims. It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • The accompanying drawings, which are incorporated in and constitute part of this specification, illustrate embodiments of the invention and together with the description, serve to explain the principles of the invention. The embodiments illustrated herein are presently preferred, it being understood, however, that the invention is not limited to the precise arrangements and instrumentalities shown, wherein:
  • FIG. 1 is a schematic illustration of a C&S system configured for personalized fine granularity access control;
  • FIG. 2 is a screen shot of an exemplary C&S system user interface configured for personalized fine granularity access control for C&S systems; and,
  • FIG. 3 is a flow chart illustrating a process for personalized fine granularity access control.
  • DETAILED DESCRIPTION OF THE INVENTION
  • Embodiments of the present invention provide a method, system and computer program product for personalized fine granularity access control. In accordance with an embodiment of the present invention, access control attributes can be assigned to each field in an event. Thereafter, when sharing the event in the calendar view of different end users, the event can be rendered with some fields hidden from view according to the permissions of a viewing user, while other fields of the event can be rendered for view. Additionally, private events can be rendered only as a private event, while the content of the private events can remain hidden. In this way, private events cannot masquerade as free time and the privacy of selected content of a shared event can be maintained.
  • In more particular illustration, FIG. 1 is a schematic illustration of a C&S system configured for personalized fine granularity access control. The C&S system can include a host computing platform 120 supporting the operation of a C&S system. The host computing platform 120 can be configured for coupling over a data communications network 130 to one or more client computing devices 110 associated with corresponding end users of the C&S system. In this way, the different end users of the C&S system can interact with the C&S system in order to create, manage and view scheduled events for one another in a collaborative environment.
  • The C&S system can include C&S core logic 140 coupled to a data store of events 160 and a corresponding C&S user interface 200. The C&S core logic 140 can include program code enabled to provide essential calendaring functionality including the creation and management of scheduled events such as those events marked private and those events that are permitted to be viewed by other end users. Additionally, the C&S core logic 140 can be coupled to access control logic 300 for determining when to expose a view to different end users of different scheduled events in the data store of events 160, and when to refrain from exposing a view to different end users of different scheduled events in the data store of events 160.
  • Importantly, the access control logic 300 can include program code enabled to provide personalized, fine granularity access control to the events in the data store of events 160. To that end, the program code of the access control logic 300 can be enabled to determine access for a particular end user on a field-by-field basis as specified by field level access attributes 150 for each event in the data store of events 160. Consequently, when rendering a view of an event in the C&S user interface 200, only those fields determined to be viewable can be rendered in the C&S user interface 200. Additionally, so as to prevent a private event from masquerading as free time, the program code of the access control logic 300 can indicate in a view of the event in the C&S user interface 200 that a private event occurs during a specified time range without revealing the content of the private event.
  • In further illustration of the view of events provided within the C&S user interface 200, FIG. 2 is a screen shot of an exemplary C&S system user interface configured for personalized fine granularity access control for C&S systems. The user interface 200 can provide a shared calendar view for multiple different end users of the C&S system. The shared calendar view can include one or more events rendered to indicate a time range of each event. Each event can include multiple different event fields 210, 220, 230, 240. The event fields can include a time range 210, an event type 220, an event person(s) or role(s) 230 and an event description 240. Other event fields can include subject, location, chairperson, and category, to name only a few.
  • As the field attributes are applied to each event in the shared calendar view, only certain fields of each event can be rendered viewable while others can be suppressed from view. Moreover, private events can show as private in the shared calendar view, though the content of the private events can be suppressed from view as shown in FIG. 2. In this way, scheduled events can be shown as consuming free time to other authorized end users, yet the privacy of a private event can be maintained. Likewise, the existence of a scheduled event can be shown, though portions of the event can remain private to only those end users authorized to view those private portions according to the field level attributes for the private portions and the identity of the end users viewing the events.
  • Notably, the access control for viewing events in a shared calendar view can be personalized according to the identity of a viewing end user, or a role of a viewing end user. In this regard, on a field-by-field basis, each field can be assigned a field level access attribute indicating whether the field is to be viewed by an authorized user, user type or role. When an end user attempts to view the field, the field will be revealed only if the identity of the end user or role of the end user matches the field level access attribute. Furthermore, the content of a field may vary according to the identity of the viewing end user or the role of the viewing end user. For instance, whereas one end user may view a field to read “re: Secret Project”, another end user may only view a field to read “re: Project”.
  • In yet further illustration, FIG. 3 is a flow chart illustrating a process for personalized fine granularity access control. Beginning in block 305, a user identifier for an end user of the C&S system can be obtained as can access rights for the end user in block 310. In block 315, a first event can be retrieved from the event database for rendering in the shared calendar view for the end user. In decision block 320, it can be determined if the event has been marked private. If so, in block 325 the event can be included in the shared calendar view for the specified time range only as a “private” event while the content of the private event can remain hidden. Of course, if the event is private to the end user associated with the user identifier, then the entirety of the private event can be included for view in the shared calendar view.
  • In decision block 320, if the event has not been marked private, in block 330, a first field in the event can be retrieved for processing. In decision block 335, if the field has field attributes permitting the rendering of the field for viewing by the end user, in block 340 the content of the field can be included in the shared calendar view. In decision block 345, if additional fields remain to be processed, in block 330 a next field can be retrieved and the process can repeat through decision block 335. When no further fields remain to be processed for the event, in decision block 350 it can be determined if additional events remain to be processed. If so, in block 315 a next event can be retrieved and the process can continue through decision block 320. Otherwise, the shared calendar view can be rendered in block 355.
  • Embodiments of the invention can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment containing both hardware and software elements. In a preferred embodiment, the invention is implemented in software, which includes but is not limited to firmware, resident software, microcode, and the like. Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system.
  • For the purposes of this description, a computer-usable or computer readable medium can be any apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid state memory, magnetic tape, a removable computer diskette, a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read/write (CD-R/W) and DVD.
  • A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, pointing devices, etc.) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Claims (19)

1. A method for personalized fine granularity access control in a calendaring and scheduling (C&S) system, the method comprising:
loading an event for inclusion in a shared calendar view;
determining on a field by field basis whether to include portions of the event in the shared calendar view; and,
rendering the calendar view.
2. The method of claim 1, further comprising:
further determining whether the event has been marked private; and,
if the event has been marked private, including in the shared calendar view only an indication that a private event has been scheduled without revealing content for the private event.
3. The method of claim 1, wherein determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
identifying an end user requesting the shared calendar view;
loading a set of field level access attributes for the event;
comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis; and,
including in the calendar view only fields of the event permitted to be viewed by the identified end user.
4. The method of claim 1, wherein determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
suppressing an identity of a person associated with the event from display in the shared calendar view; and,
including in the shared calendar view a time range and type for the event.
5. The method of claim 1, wherein determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
suppressing an description of the event from display in the shared calendar view; and,
including in the shared calendar view a time range and type for the event.
6. The method of claim 3, wherein comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, comprises comparing an identity of the end user to a field level access attribute for each corresponding field to determine whether the end user is permitted to view each corresponding field of the event.
7. The method of claim 3, wherein comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, comprises comparing a role of the end user to a field level access attribute for each corresponding field to determine whether the end user has a role permitted to view each corresponding field of the event.
8. The method of claim 3, further comprising further comparing a role of the end user to a field level access attribute for each corresponding field to determine content to be viewed within each corresponding field of the event.
9. A calendaring and scheduling (C&S) data processing system comprising:
C&S core logic coupled to a data store of events;
a C&S user interface; and,
access control logic comprising program code enabled to determine whether to include portions of events in the data store of events in a shared calendar view of the C&S user interface on a field-by-field basis according to field level access attributes for the events.
10. The C&S data processing system of claim 9, wherein the events comprise fields selected from the group consisting of event time range, event type, event participant, subject, location, chair, category and event description.
11. The C&S data processing system of claim 9, wherein the program code of the access control logic is further enabled to render an indication of a private event for an unauthorized viewer of the private event in lieu of suppressing the private event in its entirety.
12. A computer program product comprising a computer usable medium embodying computer usable program code for personalized fine granularity access control of events in a calendaring and scheduling (C&S) system, the computer program product including:
computer usable program code for loading an event for inclusion in a shared calendar view;
computer usable program code for determining on a field by field basis whether to include portions of the event in the shared calendar view; and,
computer usable program code for rendering the calendar view.
13. The computer program product of claim 12, further comprising:
computer usable program code for further determining whether the event has been marked private; and,
computer usable program code for including in the shared calendar view only an indication that a private event has been scheduled without revealing content for the private event if the event has been marked private.
14. The computer program product of claim 12, wherein the computer usable program code for determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
computer usable program code for identifying an end user requesting the shared calendar view;
computer usable program code for loading a set of field level access attributes for the event;
computer usable program code for comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis; and,
computer usable program code for including in the calendar view only fields of the event permitted to be viewed by the identified end user.
15. The computer program product of claim 12, wherein the computer usable program code for determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
computer usable program code for suppressing an identity of a person associated with the event from display in the shared calendar view; and,
computer usable program code for including in the shared calendar view a time range and type for the event.
16. The computer program product of claim 12, wherein the computer usable program code for determining on a field by field basis whether to include portions of the event in the shared calendar view, comprises:
computer usable program code for suppressing an description of the event from display in the shared calendar view; and,
computer usable program code for including in the shared calendar view a time range and type for the event.
17. The computer program product of claim 14, wherein the computer usable program code for comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, comprises computer usable program code for comparing an identity of the end user to a field level access attribute for each corresponding field to determine whether the end user is permitted to view each corresponding field of the event.
18. The computer program product of claim 14, wherein the computer usable program code for comparing the end user to the field level access attributes to determine whether the identified end user is permitted to view the event on a field-by-field basis, comprises computer usable program code for comparing a role of the end user to a field level access attribute for each corresponding field to determine whether the end user has a role permitted to view each corresponding field of the event.
19. The computer program product of claim 12, further comprising computer usable program code for further comparing a role of the end user to a field level access attribute for each corresponding field to determine content to be viewed within each corresponding field of the event.
US11/458,435 2006-07-19 2006-07-19 Personalized fine granularity access control for calendar systems Abandoned US20080022201A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/458,435 US20080022201A1 (en) 2006-07-19 2006-07-19 Personalized fine granularity access control for calendar systems

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/458,435 US20080022201A1 (en) 2006-07-19 2006-07-19 Personalized fine granularity access control for calendar systems

Publications (1)

Publication Number Publication Date
US20080022201A1 true US20080022201A1 (en) 2008-01-24

Family

ID=38972795

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/458,435 Abandoned US20080022201A1 (en) 2006-07-19 2006-07-19 Personalized fine granularity access control for calendar systems

Country Status (1)

Country Link
US (1) US20080022201A1 (en)

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090024952A1 (en) * 2007-07-20 2009-01-22 Microsoft Corporation Control and visibility for digital calendar sharing
US20090164910A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Sharing of scheduling time-blocks
DE202008004540U1 (en) * 2008-03-25 2009-08-06 Bankwitz, Fritz U., Dipl.-Ing. (FH) Electronic wall / stand calendar
US8209500B1 (en) * 2005-06-30 2012-06-26 Symantec Operating Corporation Method and apparatus for providing intelligent interpretation of calendaring information to schedule computer data operations
US20120197946A1 (en) * 2009-04-07 2012-08-02 Omnifone Ltd. Database schema complexity reduction
US20130086225A1 (en) * 2011-09-30 2013-04-04 France Telecom Mechanism for the contextual obscuring of digital data
CN103189863A (en) * 2010-08-27 2013-07-03 阿克塞尔斯普林格数字电视指导有限责任公司 Recommender system with consistent profile application
US20160293166A1 (en) * 2015-04-03 2016-10-06 Microsoft Technology Licensing, Llc Annotating Notes From Passive Recording With User Data
US9910840B2 (en) 2015-04-03 2018-03-06 Microsoft Technology Licensing, Llc Annotating notes from passive recording with categories
US11061525B2 (en) * 2019-05-16 2021-07-13 Microsoft Technology Licensing, Llc Digital map calendar user interface
US11120407B2 (en) 2019-05-16 2021-09-14 Microsoft Technology Licensing, Llc Real time collaboration in calendar
US11151104B2 (en) 2019-05-16 2021-10-19 Microsoft Technology Licensing, Llc Time systems as data
US11514405B1 (en) 2021-05-14 2022-11-29 Microsoft Technology Licensing, Llc Map calendar graphical user interface with dynamic time mold functionality
US11645628B2 (en) 2019-05-16 2023-05-09 Microsoft Technology Licensing, Llc Translation of time between calendar systems
US11681424B2 (en) 2021-05-14 2023-06-20 Microsoft Technology Licensing, Llc Map calendar graphical user interface with content-variable view levels

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4881179A (en) * 1988-03-11 1989-11-14 International Business Machines Corp. Method for providing information security protocols to an electronic calendar
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US20010028364A1 (en) * 2000-02-15 2001-10-11 Thomas Fredell Computerized method and system for communicating and managing information used in task-oriented projects
US6785868B1 (en) * 2000-05-31 2004-08-31 Palm Source, Inc. Method and apparatus for managing calendar information from a shared database and managing calendar information from multiple users
US20040268270A1 (en) * 2003-06-26 2004-12-30 Microsoft Corporation Side-by-side shared calendars
US20050278641A1 (en) * 2000-11-30 2005-12-15 Steve Mansour Javascript Calendar Application Delivered to a Web Browser
US20060041460A1 (en) * 2004-08-23 2006-02-23 Aaron Jeffrey A An electronic calendar
US20070186151A1 (en) * 2003-12-22 2007-08-09 Kimmo Jyrinki Method for sharing calendar content in communications system, communications system and terminal

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4881179A (en) * 1988-03-11 1989-11-14 International Business Machines Corp. Method for providing information security protocols to an electronic calendar
US5493692A (en) * 1993-12-03 1996-02-20 Xerox Corporation Selective delivery of electronic messages in a multiple computer system based on context and environment of a user
US20010028364A1 (en) * 2000-02-15 2001-10-11 Thomas Fredell Computerized method and system for communicating and managing information used in task-oriented projects
US6785868B1 (en) * 2000-05-31 2004-08-31 Palm Source, Inc. Method and apparatus for managing calendar information from a shared database and managing calendar information from multiple users
US20050278641A1 (en) * 2000-11-30 2005-12-15 Steve Mansour Javascript Calendar Application Delivered to a Web Browser
US20040268270A1 (en) * 2003-06-26 2004-12-30 Microsoft Corporation Side-by-side shared calendars
US20070186151A1 (en) * 2003-12-22 2007-08-09 Kimmo Jyrinki Method for sharing calendar content in communications system, communications system and terminal
US20060041460A1 (en) * 2004-08-23 2006-02-23 Aaron Jeffrey A An electronic calendar

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8209500B1 (en) * 2005-06-30 2012-06-26 Symantec Operating Corporation Method and apparatus for providing intelligent interpretation of calendaring information to schedule computer data operations
US8122362B2 (en) * 2007-07-20 2012-02-21 Microsoft Corporation Control and visibility for digital calendar sharing
US20090024952A1 (en) * 2007-07-20 2009-01-22 Microsoft Corporation Control and visibility for digital calendar sharing
US20090164910A1 (en) * 2007-12-20 2009-06-25 Nokia Corporation Sharing of scheduling time-blocks
DE202008004540U1 (en) * 2008-03-25 2009-08-06 Bankwitz, Fritz U., Dipl.-Ing. (FH) Electronic wall / stand calendar
US20120197946A1 (en) * 2009-04-07 2012-08-02 Omnifone Ltd. Database schema complexity reduction
CN103189863A (en) * 2010-08-27 2013-07-03 阿克塞尔斯普林格数字电视指导有限责任公司 Recommender system with consistent profile application
US10123203B2 (en) * 2011-09-30 2018-11-06 Orange Mechanism for the contextual obscuring of digital data
US20130086225A1 (en) * 2011-09-30 2013-04-04 France Telecom Mechanism for the contextual obscuring of digital data
US20160293166A1 (en) * 2015-04-03 2016-10-06 Microsoft Technology Licensing, Llc Annotating Notes From Passive Recording With User Data
US9910840B2 (en) 2015-04-03 2018-03-06 Microsoft Technology Licensing, Llc Annotating notes from passive recording with categories
US11061525B2 (en) * 2019-05-16 2021-07-13 Microsoft Technology Licensing, Llc Digital map calendar user interface
US11120407B2 (en) 2019-05-16 2021-09-14 Microsoft Technology Licensing, Llc Real time collaboration in calendar
US11151104B2 (en) 2019-05-16 2021-10-19 Microsoft Technology Licensing, Llc Time systems as data
US11645628B2 (en) 2019-05-16 2023-05-09 Microsoft Technology Licensing, Llc Translation of time between calendar systems
US11514405B1 (en) 2021-05-14 2022-11-29 Microsoft Technology Licensing, Llc Map calendar graphical user interface with dynamic time mold functionality
US11681424B2 (en) 2021-05-14 2023-06-20 Microsoft Technology Licensing, Llc Map calendar graphical user interface with content-variable view levels

Similar Documents

Publication Publication Date Title
US20080022201A1 (en) Personalized fine granularity access control for calendar systems
CN107506620B (en) Application market manages control
US10108808B2 (en) Data access sharing
US8117056B2 (en) Integrating special requests with a calendar application
US20080140488A1 (en) Event scheduling conflict management and resolution for unprocessed events in a collaborative computing environment
US8321796B2 (en) Dynamic meeting agenda generation based on presenter availability
US8407302B2 (en) Managing meeting invitations to sub-invitees
US9250855B2 (en) Displaying images for people associated with a message item
US20090319623A1 (en) Recipient-dependent presentation of electronic messages
US20090144619A1 (en) Method to protect sensitive data fields stored in electronic documents
US20140200944A1 (en) Automation of meeting scheduling and task list access permissions within a meeting series
US20100313239A1 (en) Automated access control for rendered output
EP2102757A2 (en) Methods and apparatuses for selectively processing, dynamically suggesting, and automatically initiating an application, and managing the distribution and installation of applications
TW200941257A (en) System, method and program for preference matching
NO331310B1 (en) Procedure for initiating server-based collaboration on email attachments.
JP2007272887A (en) Method, system and program for scheduling event
US9928486B2 (en) Method and system for selectively displaying calendar information on secure calendar
US11349848B2 (en) Experience for sharing computer resources and modifying access control rules using mentions
CN113961971B (en) Method and device for reminding setting of file authority of network disk, network disk and storage medium
US11328254B2 (en) Automatic group creation based on organization hierarchy
US20080155430A1 (en) Integrating private metadata into a collaborative environment
US20100162410A1 (en) Digital rights management (drm) content protection by proxy transparency control
US10742580B2 (en) Intelligent prevention of spam emails at share sites
US20070150591A1 (en) Reliable page flow control
US20160191440A1 (en) Intelligent prevention of spam emails at share sites

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CHEN, LI;LI, YONGCHENG;XIAO, LUN;REEL/FRAME:017958/0304;SIGNING DATES FROM 20060717 TO 20060718

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION